Ex-eBay CISOs Startup Aims To Beef Up Attack Information-Sharing

  /     /     /  
Publicated : 22/11/2024   Category : security


Ex-eBay CISOs Startup Aims To Beef Up Attack Information-Sharing


SecurityStarfish offers commercial service for victim companies to anonymously share breach war stories, intelligence, mitigations



The former chief information security officer at eBay has launched a new startup that offers a subscription-based service for companies hit by cyberattacks to anonymously share their war stories and obtain inside information on new attack campaigns and deflection methods.
SecurityStarfish
, co-founded by David Cullinane, who served as CISO at eBay for five years, and Gordon Shevlin, former executive vice president at FishNet, emerged from stealth this week offering a commercial platform that analyzes its members shared attack intelligence, remedies for defense, and offers heads-up attack information.
Talk of victims teaming to fight back against cyberattackers rather than going it alone began in earnest in the wake of the game-changing targeted hacks of Google, Intel, Adobe, and others in early 2010. While numerous ad-hoc and industry-specific mechanisms and groups exist for companies to swap their attack stories and intelligence, the majority of these efforts by nature are voluntary and informal. SecurityStarfish is taking that strategy to a more commercial level -- something that Cullinane, who spent years working with other companies to share their attack experiences and intelligence informally, says is key to successfully converting that information into action that helps protect those organizations from falling victim to other attacks.
[ Major global corporations call for more collaboration among organizations hit by cyberattacks, but the devils in the details. See
Victim Businesses Teaming Up To Fight Cybercriminals
. ]
SecurityStarfish CEO Cullinane says during his tenure at eBay, he worked with other CSOs to share attack information on an ad-hoc basis, but in many cases, the process hit a dead end. By the time we explained to each other what had happened, and PR, and legal got involved, things didnt go much further, he says. One of the problems with this is its based on volunteer [activity]. People get busy with things, priorities shift, and [follow-up] doesnt always work.
So he spoke with some CSOs at the RSA Conference earlier this year and cemented the idea of making this attack info-sharing process a paid enterprise so it becomes a more official and regular process -- with follow-up. We are trying to change the picture from the adversary making money ... to changing the balance of power, so to speak, by getting things done more effectively in collaboration and stop them from being able to monetize their attacks, Cullinane says.
SecurityStarfish provides a portal to its members, which currently span Fortune companies in the financial services, manufacturing, retail, and energy industries, where they anonymously submit information and intelligence about attacks theyve experienced. The company then analyzes all of the data using various tools, including Hadoop, and provides frequent reports that analyze the latest threats and provide guidance on how to remediate and protect against them.
We give them feedback on whats happening in their vertical and cross-vertically, Cullinane says. Its not just intelligence-gathering, aggregation, and doing the sophisticated analysis of whats happening out there. SecurityStarfish also will host working forums several times a year where member companies can share what they are doing that works in preventing attacks or mitigating threats, he says, as well as collaborate on mitigation and defense strategies.
So what does this new commercial entity mean for the ad-hoc, regional, and industry-specific attack information-sharing groups out there, including the ISACs, InfraGuards, and others?
These groups will remain key go-to places for many companies and organizations, experts say. But its unclear in the future how organizations will select which one to go to in the aftermath of an attack if they join up with a commercial enterprise like SecurityStarfish.
The predominant way of sharing war stories and information is to get a bunch of peers together, close the doors, and talk about it, says Wade Baker, director of risk intelligence at Verizon. I think its useful and serves its purposes. But when youre talking at sharing tactical-level information, you cant have a session to share that information fast enough.
Baker concurs that one of the big hurdles with ad-hoc efforts is the corporate legal department. I think theres more recognition of the value this kind of information has, so therefore theres a greater willingness at least to look at methods of sharing this kind of intelligence responsibly, he says.
If a company shares a malware hash it found on one of itssystems that its antivirus didnt catch, that could help the rest of the community, he says. If legal can understand what theyre doing there ... and that next time [AV] will be able recognize it as badware because other organizations shared their samples, then it could smooth the way for more sharing, he says.
Jacques Francoeur, founder and executive director of the Union of Concerned Cybersecurity Leaders (UCCL) and a former officer with the Bay Area CSO Council, says the key difference with SecurityStarfishs approach is that it formalizes a breach-information exchange. And thats a two-edged sword: When you formalize it, you have to put in place disclosure agreements, and the formalization process, in many cases, is a path to killing the exchange [of information]. Legal does not yet appreciate the upside of sharing, he says.
Meanwhile, the informal, ad-hoc method in use today is not scalable, he says.
SecurityStarfish costs $60,000 per year, and Cullinane says his companys collaboration model is ultimately cheaper than going it alone. The cost of doing this as an individual company that has to figure out a solution to every single attack or type of attack becomes an incredibly expensive proposition, he says. Teaming in the fight is the only way to beat the bad guys, who already collaborate among themselves, he says.
UCCLs Francoeur says the value of SecurityStarfish would come from the actionable information it offers its members. The catch, he says, will be what level and quality of intelligence the members provide. And theyll have to get a critical mass so theres sufficient value to other members, he says.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Ex-eBay CISOs Startup Aims To Beef Up Attack Information-Sharing